首页 > 最新文献

2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)最新文献

英文 中文
Study on BFGS fitting method of metal high cycle fatigue damage parameters 金属高周疲劳损伤参数BFGS拟合方法研究
Yongjie Zhang, Yanyun Xu, Zheng Yang, Qin Sun
In order to obtain more accurate Lemaitre high cycle fatigue damage parameters, a BFGS quasi-Newton fitting method is proposed by optimizing the residual difference between the predicted life and actual life in the least square method. The damage parameters are solved in the damage evolution equation of metal high cycle fatigue. Taking 2A12-T4 aluminum alloy as an example, the precision and solution efficiency of BFGS quasi-Newton fitting method were verified for the evaluation of metal high cycle fatigue life.
为了获得更精确的Lemaitre高周疲劳损伤参数,采用最小二乘法对预测寿命与实际寿命的残差进行优化,提出了BFGS准牛顿拟合方法。在金属高周疲劳损伤演化方程中求解损伤参数。以2A12-T4铝合金为例,验证了BFGS准牛顿拟合方法对金属高周疲劳寿命评估的精度和求解效率。
{"title":"Study on BFGS fitting method of metal high cycle fatigue damage parameters","authors":"Yongjie Zhang, Yanyun Xu, Zheng Yang, Qin Sun","doi":"10.1109/ICSESS.2017.8342957","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342957","url":null,"abstract":"In order to obtain more accurate Lemaitre high cycle fatigue damage parameters, a BFGS quasi-Newton fitting method is proposed by optimizing the residual difference between the predicted life and actual life in the least square method. The damage parameters are solved in the damage evolution equation of metal high cycle fatigue. Taking 2A12-T4 aluminum alloy as an example, the precision and solution efficiency of BFGS quasi-Newton fitting method were verified for the evaluation of metal high cycle fatigue life.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127719655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incremental k-NN SVM method in intrusion detection 入侵检测中的增量k-NN SVM方法
Binhan Xu, Shuyu Chen, Hancui Zhang, Tianshu Wu
The intrusion or attack in the computer network is one of the most important issues in Cloud environment. Due to enormous network traffic, dynamic and incremental learning is important to intrusion detection system (IDS) in Cloud. In existing incremental algorithms, k Nearest Neighbors (k-NN) has the advantage of dealing with the huge and incremental multi-class nature of data. However, k-NN algorithm has poor performance in classification. Support Vector Machine (SVM) is an extraordinary classification method widely used in intrusion detection field, while its training time increases sharply with expansion of training data. Therefore, we proposed Incremental k-NN SVM method using combination of k-NN and SVM, bringing advantages of the both methods. In this approach an R∗-tree provides efficient expansion of training data and query for k-NN. Experiments on open dataset KDDCUP 99 indicates that Incremental k-NN SVM intrusion detection method has the ability to learn and update with new data in acceptable time, and its predicting time does not increase rapidly along the incremental learning process.
计算机网络中的入侵或攻击是云环境中最重要的问题之一。由于庞大的网络流量,动态和增量学习对云环境下的入侵检测系统至关重要。在现有的增量算法中,k近邻算法(k- nn)在处理数据的庞大和增量的多类特性方面具有优势。然而,k-NN算法在分类方面的性能较差。支持向量机(SVM)是一种广泛应用于入侵检测领域的特殊分类方法,随着训练数据的扩大,其训练时间急剧增加。因此,我们提出了将k-NN和SVM相结合的增量k-NN支持向量机方法,将两者的优点结合起来。在这种方法中,R *树为k-NN提供了有效的训练数据扩展和查询。在开放数据集KDDCUP 99上的实验表明,增量k-NN SVM入侵检测方法具有在可接受的时间内学习和更新新数据的能力,并且其预测时间不会随着增量学习过程而快速增加。
{"title":"Incremental k-NN SVM method in intrusion detection","authors":"Binhan Xu, Shuyu Chen, Hancui Zhang, Tianshu Wu","doi":"10.1109/ICSESS.2017.8343013","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8343013","url":null,"abstract":"The intrusion or attack in the computer network is one of the most important issues in Cloud environment. Due to enormous network traffic, dynamic and incremental learning is important to intrusion detection system (IDS) in Cloud. In existing incremental algorithms, k Nearest Neighbors (k-NN) has the advantage of dealing with the huge and incremental multi-class nature of data. However, k-NN algorithm has poor performance in classification. Support Vector Machine (SVM) is an extraordinary classification method widely used in intrusion detection field, while its training time increases sharply with expansion of training data. Therefore, we proposed Incremental k-NN SVM method using combination of k-NN and SVM, bringing advantages of the both methods. In this approach an R∗-tree provides efficient expansion of training data and query for k-NN. Experiments on open dataset KDDCUP 99 indicates that Incremental k-NN SVM intrusion detection method has the ability to learn and update with new data in acceptable time, and its predicting time does not increase rapidly along the incremental learning process.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133764960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Analysis of energy demand forecasting model in the context of electric power alteration 电力变化背景下的能源需求预测模型分析
B. Shan, D. Jia, Lu Zhang, Fang Cao, Yi Sun
The electric power alteration strategy can realize the substitution of the power supply for the coal and the fuel in the terminal energy consumption, which can realize the fundamental change of energy development mode. In this paper, to provide theoretical guidance for grid planning, energy demand forecasting model influencing factors in the context of electric power alteration are thoroughly analyzed, which concludes four key influence factors including environmental protection pressure restriction, energy price fluctuation, policy support and technical substitution. Combined all the factors, energy demand forecasting models in the context of electric power alteration including the Markal model(Market Allocation Model), LEAP model, MAED model(Model for Analysis of Energy Demand) are built, which can provide references for electric power alteration in China.
变电战略可以实现电力在终端能源消费上对煤和燃料的替代,可以实现能源发展方式的根本转变。本文深入分析了电力变电背景下的能源需求预测模型的影响因素,为电网规划提供理论指导,归纳出环境保护压力制约、能源价格波动、政策支持和技术替代四大关键影响因素。综合各因素,构建了电力变电背景下的能源需求预测模型,包括市场配置模型(Markal model)、LEAP模型、能源需求分析模型(MAED model),可为中国电力变电提供参考。
{"title":"Analysis of energy demand forecasting model in the context of electric power alteration","authors":"B. Shan, D. Jia, Lu Zhang, Fang Cao, Yi Sun","doi":"10.1109/ICSESS.2017.8343032","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8343032","url":null,"abstract":"The electric power alteration strategy can realize the substitution of the power supply for the coal and the fuel in the terminal energy consumption, which can realize the fundamental change of energy development mode. In this paper, to provide theoretical guidance for grid planning, energy demand forecasting model influencing factors in the context of electric power alteration are thoroughly analyzed, which concludes four key influence factors including environmental protection pressure restriction, energy price fluctuation, policy support and technical substitution. Combined all the factors, energy demand forecasting models in the context of electric power alteration including the Markal model(Market Allocation Model), LEAP model, MAED model(Model for Analysis of Energy Demand) are built, which can provide references for electric power alteration in China.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134021542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Krill Herd Optimization algorithm for cancer feature selection and random forest technique for classification 磷虾群优化算法的癌症特征选择和随机森林技术的分类
R. R. Rani, D. Ramyachitra
The Cancer Feature Selection and classification problem is one of the prevalent tasks in computational molecular biology. Detecting a gene or list of genes which cause cancer can be acknowledged using the feature selection and classification which leads to giving a faultless treatment for patient and drug discovery of the particular gene. The feature selection and classification of cancer using microarray gene expression data is a computationally difficult task. Even now, the computation of gene selection and classification is a challenging area to provide an exact biological related gene that causes cancer. In this work, three methods have been proposed. One is the Fish Swarm Optimization algorithm along with both Support Vector Machine and Random Forest technique for cancer feature selection and classification. But the above methods have reduced very few features from the datasets. Thus, they are considered as an existing method for this work. Now, the second proposed method namely an enhanced Krill Herd Optimization (KHO) technique was employed for selecting the genes and Random Forest (RF) Technique was employed to classify the cancer types. The Random Forest classification has been used because of its accurate classification accuracy. First, the subset of features is selected using KHO and the Random Forest classification is applied to the selected features. Ten different gene microarray cancer datasets were used to evaluate the efficiency of the proposed. The proposed KHO/RF method is compared with other well-known existing methods like PSO/SVM, PSO/RF, FSO/SVM and FSO/RF. As an outcome, the proposed method outperforms the other existing methods with 100% accuracy of results for most datasets.
肿瘤特征选择与分类问题是计算分子生物学研究的热点问题之一。使用特征选择和分类可以识别导致癌症的基因或基因列表,从而为特定基因的患者和药物发现提供完美的治疗。利用微阵列基因表达数据对癌症进行特征选择和分类是一项计算困难的任务。即使是现在,基因选择和分类的计算仍然是一个具有挑战性的领域,无法提供导致癌症的确切生物学相关基因。在这项工作中,提出了三种方法。一种是鱼群优化算法,结合支持向量机和随机森林技术进行癌症特征选择和分类。但上述方法从数据集中减少的特征很少。因此,它们被认为是这项工作的现有方法。目前,第二种方法即增强型磷虾群优化(KHO)技术用于基因选择,随机森林(RF)技术用于癌症类型分类。随机森林分类法因其准确的分类精度而得到广泛应用。首先,使用KHO选择特征子集,并对所选特征应用随机森林分类。使用10个不同的基因微阵列癌症数据集来评估所提出的效率。将KHO/RF方法与现有的PSO/SVM、PSO/RF、FSO/SVM和FSO/RF等方法进行了比较。结果表明,对于大多数数据集,该方法的结果准确率为100%,优于其他现有方法。
{"title":"Krill Herd Optimization algorithm for cancer feature selection and random forest technique for classification","authors":"R. R. Rani, D. Ramyachitra","doi":"10.1109/ICSESS.2017.8342875","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342875","url":null,"abstract":"The Cancer Feature Selection and classification problem is one of the prevalent tasks in computational molecular biology. Detecting a gene or list of genes which cause cancer can be acknowledged using the feature selection and classification which leads to giving a faultless treatment for patient and drug discovery of the particular gene. The feature selection and classification of cancer using microarray gene expression data is a computationally difficult task. Even now, the computation of gene selection and classification is a challenging area to provide an exact biological related gene that causes cancer. In this work, three methods have been proposed. One is the Fish Swarm Optimization algorithm along with both Support Vector Machine and Random Forest technique for cancer feature selection and classification. But the above methods have reduced very few features from the datasets. Thus, they are considered as an existing method for this work. Now, the second proposed method namely an enhanced Krill Herd Optimization (KHO) technique was employed for selecting the genes and Random Forest (RF) Technique was employed to classify the cancer types. The Random Forest classification has been used because of its accurate classification accuracy. First, the subset of features is selected using KHO and the Random Forest classification is applied to the selected features. Ten different gene microarray cancer datasets were used to evaluate the efficiency of the proposed. The proposed KHO/RF method is compared with other well-known existing methods like PSO/SVM, PSO/RF, FSO/SVM and FSO/RF. As an outcome, the proposed method outperforms the other existing methods with 100% accuracy of results for most datasets.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130358402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Software complexity measurement based on complex network 基于复杂网络的软件复杂度度量
Liu Hanyan, Wang Shihai, Liu Bin, X. Peng
Usually the complexity metric of software focuses on the complexity of code level, function level or structure level separately. It lacks of measurement for the comprehensive complexity of software system. This paper proposes a complexity metric model of three-level cascade network that based on complex network theory. In this metric model, the complexity of code level, function level and structure level are measured and the cascaded relationship between the three levels are analyzed. At last, the three-level cascade network model is built and the comprehensive complexity of software system is measured though the three-level cascade network model. The experiment result shows that the comprehensive complexity of the software system is correlated positively to the number of software defects.
通常,软件的复杂性度量分别关注代码级、功能级和结构级的复杂性。它缺乏对软件系统综合复杂性的度量。基于复杂网络理论,提出了三级级联网络的复杂度度量模型。该度量模型测量了代码层、功能层和结构层的复杂度,并分析了这三个层次之间的级联关系。最后,建立了三级级联网络模型,并通过三级级联网络模型测量了软件系统的综合复杂性。实验结果表明,软件系统的综合复杂性与软件缺陷数呈正相关。
{"title":"Software complexity measurement based on complex network","authors":"Liu Hanyan, Wang Shihai, Liu Bin, X. Peng","doi":"10.1109/ICSESS.2017.8342910","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342910","url":null,"abstract":"Usually the complexity metric of software focuses on the complexity of code level, function level or structure level separately. It lacks of measurement for the comprehensive complexity of software system. This paper proposes a complexity metric model of three-level cascade network that based on complex network theory. In this metric model, the complexity of code level, function level and structure level are measured and the cascaded relationship between the three levels are analyzed. At last, the three-level cascade network model is built and the comprehensive complexity of software system is measured though the three-level cascade network model. The experiment result shows that the comprehensive complexity of the software system is correlated positively to the number of software defects.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134257486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on survivability of multi-layer electric power service 多层电力服务的生存能力研究
Li Wei, S. Pei, Wang Wenjin, Y. Hao, Chen Zhuo, Sun Yi, Lin Bin
The terminal communication access network of power system is an information channel to guarantee the normal operation of the power grid, the rapid response of the fault, the efficient utilization of resources, the real-time transmission of the business and the sustainable production of electricity. For multi-layer networks, the use of single-layer survivability strategy may lead to the intensification of resource competition and the protection of the business, which requires the multi-layer network survivability strategy for inter-level coordination. In view of the current application status of multilayer communication bearer network, the survivability technology of multilayer network service carrier is researched, and the multi tier survivability network layer coordination is mainly studied.
电力系统终端通信接入网是保证电网正常运行、故障快速响应、资源高效利用、业务实时传输和电力可持续生产的信息通道。对于多层网络,采用单层生存性策略可能导致资源竞争加剧和业务保护,这就需要多层网络生存性策略进行层间协调。针对当前多层通信承载网的应用现状,对多层网络业务载体的生存性技术进行了研究,重点研究了多层生存性网络的层协调问题。
{"title":"Research on survivability of multi-layer electric power service","authors":"Li Wei, S. Pei, Wang Wenjin, Y. Hao, Chen Zhuo, Sun Yi, Lin Bin","doi":"10.1109/ICSESS.2017.8342988","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342988","url":null,"abstract":"The terminal communication access network of power system is an information channel to guarantee the normal operation of the power grid, the rapid response of the fault, the efficient utilization of resources, the real-time transmission of the business and the sustainable production of electricity. For multi-layer networks, the use of single-layer survivability strategy may lead to the intensification of resource competition and the protection of the business, which requires the multi-layer network survivability strategy for inter-level coordination. In view of the current application status of multilayer communication bearer network, the survivability technology of multilayer network service carrier is researched, and the multi tier survivability network layer coordination is mainly studied.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134411513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The research of path planning for general aviation based on improved A∗ algorithm 基于改进A *算法的通用航空路径规划研究
H. Sun, Xiling Luo, Yifu Xu
To solve the problem of large search space, large number of extended nodes, long searching time and large memory consumption for 3D path planning in general aviation(GA), this paper proposes an improved A∗ algorithm based on classical A∗ algorithm. The improved method first dynamically build 3D grid search space based on initial node and target node. Then nodes are extended by improving cost function, setting dynamic step length, and maintaining current flight state. Also optimize data structure to improve search efficiency. Finally, this paper has developed an application for real terrain that can be used to quickly and efficiently plan an optimized path.
针对通用航空(GA)三维路径规划中搜索空间大、扩展节点多、搜索时间长、内存消耗大的问题,在经典A∗算法的基础上提出了一种改进的A∗算法。该方法首先基于初始节点和目标节点动态构建三维网格搜索空间;然后通过改进代价函数、设置动态步长和保持当前飞行状态来扩展节点。同时优化数据结构,提高搜索效率。最后,本文开发了一个适用于实际地形的应用程序,可用于快速有效地规划优化路径。
{"title":"The research of path planning for general aviation based on improved A∗ algorithm","authors":"H. Sun, Xiling Luo, Yifu Xu","doi":"10.1109/ICSESS.2017.8342939","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342939","url":null,"abstract":"To solve the problem of large search space, large number of extended nodes, long searching time and large memory consumption for 3D path planning in general aviation(GA), this paper proposes an improved A∗ algorithm based on classical A∗ algorithm. The improved method first dynamically build 3D grid search space based on initial node and target node. Then nodes are extended by improving cost function, setting dynamic step length, and maintaining current flight state. Also optimize data structure to improve search efficiency. Finally, this paper has developed an application for real terrain that can be used to quickly and efficiently plan an optimized path.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131926524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SQL injection attack detection using fingerprints and pattern matching technique 使用指纹和模式匹配技术检测SQL注入攻击
Benjamin Appiah, Eugene Opoku-Mensah, Zhiguang Qin
Web-Based applications are becoming more increasingly technically complex and sophisticated. The very nature of their feature-rich design and their capability to collate, process, and disseminate information over the Internet or from within an intranet makes them a popular target for attack. According to Open Web Application Security Project (OWASP) Top Ten Cheat sheet-2017, SQL Injection Attack is at peak among online attacks. This can be attributed primarily to lack of awareness on software security. Developing effective SQL injection detection approaches has been a challenge in spite of extensive research in this area. In this paper, we propose a signature based SQL injection attack detection framework by integrating fingerprinting method and Pattern Matching to distinguish genuine SQL queries from malicious queries. Our framework monitors SQL queries to the database and compares them against a dataset of signatures from known SQL injection attacks. If the fingerprint method cannot determine the legitimacy of query alone, then the Aho Corasick algorithm is invoked to ascertain whether attack signatures appear in the queries. The initial experimental results of our framework indicate the approach can identify wide variety of SQL injection attacks with negligible impact on performance.
基于web的应用程序在技术上变得越来越复杂和复杂。其特性丰富的设计及其在Internet上或从内部网中整理、处理和传播信息的能力使其成为攻击的热门目标。根据开放Web应用程序安全项目(OWASP) 2017年十大备查单,SQL注入攻击是在线攻击的高峰。这主要是由于缺乏对软件安全的认识。尽管在这一领域进行了广泛的研究,但开发有效的SQL注入检测方法一直是一个挑战。本文提出了一种基于签名的SQL注入攻击检测框架,该框架将指纹识别方法与模式匹配相结合,用于区分真实的SQL查询和恶意的SQL查询。我们的框架监控对数据库的SQL查询,并将其与来自已知SQL注入攻击的签名数据集进行比较。如果指纹法不能单独确定查询的合法性,则调用Aho Corasick算法来确定查询中是否出现攻击签名。我们的框架的初步实验结果表明,该方法可以识别各种SQL注入攻击,而对性能的影响可以忽略不计。
{"title":"SQL injection attack detection using fingerprints and pattern matching technique","authors":"Benjamin Appiah, Eugene Opoku-Mensah, Zhiguang Qin","doi":"10.1109/ICSESS.2017.8342983","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342983","url":null,"abstract":"Web-Based applications are becoming more increasingly technically complex and sophisticated. The very nature of their feature-rich design and their capability to collate, process, and disseminate information over the Internet or from within an intranet makes them a popular target for attack. According to Open Web Application Security Project (OWASP) Top Ten Cheat sheet-2017, SQL Injection Attack is at peak among online attacks. This can be attributed primarily to lack of awareness on software security. Developing effective SQL injection detection approaches has been a challenge in spite of extensive research in this area. In this paper, we propose a signature based SQL injection attack detection framework by integrating fingerprinting method and Pattern Matching to distinguish genuine SQL queries from malicious queries. Our framework monitors SQL queries to the database and compares them against a dataset of signatures from known SQL injection attacks. If the fingerprint method cannot determine the legitimacy of query alone, then the Aho Corasick algorithm is invoked to ascertain whether attack signatures appear in the queries. The initial experimental results of our framework indicate the approach can identify wide variety of SQL injection attacks with negligible impact on performance.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132164392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A vessel imagery enhancement method of spaceborne SAR based on CS-TFD 基于CS-TFD的星载SAR舰船图像增强方法
Guochao Lao, W. Ye, Guozhu Liu
The spaceborne synthetic aperture radar (SAR) image would become defocused and fuzzy when aiming to a moving vessel. To solve the problem, a vessel imagery enhancement method combining compressed sensing (CS) with time frequency distribution (TFD) is presented, by which, the imaging result is improved, and a series of images at different azimuth time are obtained showing the vessel posture changing. The validity of the method is verified by processing a measured SAR image.
星载合成孔径雷达(SAR)在瞄准运动舰船时,图像会出现离焦和模糊。针对这一问题,提出了一种将压缩感知(CS)与时频分布(TFD)相结合的船舶图像增强方法,提高了成像效果,得到了一系列不同方位时间下船舶姿态变化的图像。通过对SAR实测图像的处理,验证了该方法的有效性。
{"title":"A vessel imagery enhancement method of spaceborne SAR based on CS-TFD","authors":"Guochao Lao, W. Ye, Guozhu Liu","doi":"10.1109/ICSESS.2017.8342961","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342961","url":null,"abstract":"The spaceborne synthetic aperture radar (SAR) image would become defocused and fuzzy when aiming to a moving vessel. To solve the problem, a vessel imagery enhancement method combining compressed sensing (CS) with time frequency distribution (TFD) is presented, by which, the imaging result is improved, and a series of images at different azimuth time are obtained showing the vessel posture changing. The validity of the method is verified by processing a measured SAR image.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133276473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extended definition of medical big data 医疗大数据扩展定义
Fadia Shah, Jianping Li, Y. Shah, F. Shah
The human life is always experiencing problems related to health. The survival is difficult if not treated well. For a better recovery, health problems are solved by treatment plans and medications; which are by health care professional called specialists, doctors or medical practitioners. Whatever these professionals recommend, it is well maintained in the form of reports. The collection of all this record makes Medical Big Data (MBD). Based upon the medical problem, this MBD includes medical history and prescription reports, test reports, X-Ray, CT Scan, and some other types of medical diagnosis. Traditional systems are now improved after the enhancements in telecommunication modes and innovation of smart devices with latest 5G technology has a huge contribution in every field of science. Regarding health care systems, in developed countries, E-Health and Telemedicine systems being developed to improve the quality of treatment. Such systems have many enhanced features like data management, reliable diagnoses; among them a distinct aspect is load reduction for the patient about data availability and management. Since MBD is increasing for every patient as the time passes and the patient consults again and again. Many schemes with efficient models are proposed to make this MBD available over the network by compression and network management tools. This exponential expansion of MBD has unmitigated the domains of MBD generating sources. In this paper, MBD collection, sources are discussed which ensure directly or indirectly how some domains are responsible to increase MBD more than normal ways.
人的一生总是会遇到与健康有关的问题。如果治疗不好,生存是困难的。为了更好地康复,健康问题是通过治疗计划和药物来解决的;这是由被称为专家、医生或医疗从业人员的卫生保健专业人员进行的。无论这些专业人员推荐什么,它都以报告的形式得到了很好的维护。所有这些记录的集合构成了医疗大数据(MBD)。基于医疗问题,本MBD包括病史和处方报告、检查报告、x光片、CT扫描和一些其他类型的医疗诊断。在电信模式的增强之后,传统系统得到了改进,智能设备的创新与最新的5G技术在每个科学领域都有巨大的贡献。关于保健系统,在发达国家,正在开发电子保健和远程医疗系统,以提高治疗质量。这样的系统有许多增强的功能,如数据管理、可靠的诊断;其中一个独特的方面是减轻患者在数据可用性和管理方面的负担。因为随着时间的推移,MBD对每个病人来说都在增加,病人一次又一次地咨询。为了通过压缩和网络管理工具使MBD在网络上可用,提出了许多具有有效模型的方案。这种MBD的指数级扩展扩大了MBD产生源的范围。本文讨论了MBD集合的来源,这些来源直接或间接地确保了某些域如何比正常方式更负责增加MBD。
{"title":"Extended definition of medical big data","authors":"Fadia Shah, Jianping Li, Y. Shah, F. Shah","doi":"10.1109/ICSESS.2017.8342967","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342967","url":null,"abstract":"The human life is always experiencing problems related to health. The survival is difficult if not treated well. For a better recovery, health problems are solved by treatment plans and medications; which are by health care professional called specialists, doctors or medical practitioners. Whatever these professionals recommend, it is well maintained in the form of reports. The collection of all this record makes Medical Big Data (MBD). Based upon the medical problem, this MBD includes medical history and prescription reports, test reports, X-Ray, CT Scan, and some other types of medical diagnosis. Traditional systems are now improved after the enhancements in telecommunication modes and innovation of smart devices with latest 5G technology has a huge contribution in every field of science. Regarding health care systems, in developed countries, E-Health and Telemedicine systems being developed to improve the quality of treatment. Such systems have many enhanced features like data management, reliable diagnoses; among them a distinct aspect is load reduction for the patient about data availability and management. Since MBD is increasing for every patient as the time passes and the patient consults again and again. Many schemes with efficient models are proposed to make this MBD available over the network by compression and network management tools. This exponential expansion of MBD has unmitigated the domains of MBD generating sources. In this paper, MBD collection, sources are discussed which ensure directly or indirectly how some domains are responsible to increase MBD more than normal ways.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"78 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133871328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1